Showing posts with label WikiLeaks. Show all posts
Showing posts with label WikiLeaks. Show all posts

Monday, 7 October 2024

More USA Presidential Madness 2024?

Another US Presidential Election - Nothing Will Change - Again!

By Dark Politricks

Here comes another US Presidential election and another mess for the rest of the world to look to and ask itself:
"Is this really Democracy?"

I think many countries, especially the few left who have any real belief in the US as a "beacon of freedom", will be answering in the negative. Those who know better, or act with the US as cohorts, such as the EU, will keep quiet and pretend the great experiment in "liberty and natural born human rights" created in1776's is continuing.

Those who have been tampered with through US bribery, coups, unfair economic tariffs or sanctions, will again see that the American's cry of "US Freedom and Democracy" that the USA believes is the ideal way to force run other societies, is a lie inside it's own borders.

Nothing will happen to better or change the lives for the average US citizen whoever gets into power. Everyone with half a brain knows the real reigns of power are not controlled by the President or Vice President

If that were true, Kamala Harris would be acting as the President now. Also all the "new policies" she claims to want to implement elected, if Joe Biden is so unfit to run for another term, she could do so. Also the second cabinet meeting of 2024, only held a couple of weeks ago, would not have been chaired by Joe's wife! 

Whoever thought that showing the start of that meeting on public air waves did a severe disservice to anyone with any remaining thoughts that the US elected politicians wielded any real power. They obviously don't if Joe or his wife can run the executive branch of US government.

No one in the world will feel much difference when the Deep State gains further power through the election of supposedly populist Donald Trump, or the blackwashed Kamala Harris

The powers that stay hidden seem to be backing the blackwashed, grand daughter of Irish slave traders, who according to some has been faking a history so murky it compares to the claims made by Trump back when Obama was running first for President. When Obama's birth certificate and Kenyan heritage, was big news, along with a possible passport issued by the British Empire. 

This is something that would have made him illegitimate under US law to hold the highest office in the land. It's probably the same as someone coming from the ex British Crown colony of Jamacia, now in the British Commonwealth. Here is a look into the Democratic nominee for Presidents history, and her family background that she seems to be hiding the truth about.

Candace Owens Looks Into The Blackwashing of Kamala Harris

However, to the real rulers of power it makes little difference who they place in the public facing office. A political patsie to take all the flack the masses may throw at them for the failure of the government to actually do anything to help the people of the country, rather than their donors, the MIC and Big Business. 

Those voters actually taking time off work to vote, might think it actually makes a difference what choice they make. Maybe some know that if the Empire wanted to, their swipe on an electronic voting machine could easily be switched in a second to their opponent. It doesn't take Russia to do the hacking, but it helps that they or Iran could be blamed for doing so.

I think it has been clear for years, and with every years Las Vegas Def Con Voting Village competition, even kids are now able to hack the latest voting machines. Therefore it makes it little more than a trivial event for those behind the scenes to switch the voting tally if they cared to do so. Those millions who will vote, will all no doubt make claims of another  "stolen election", if their candidate doesn't win.

I still cannot get over the hypocrisy of the Democrats who moaned so much about Trumps dislike of the way the 2020 COVID election was handled. This was when due to the plandemic, votes could just be dropped off in mailboxes with no security to manage or control the access to these important boxes. His claims of foul play were just dismissed as the cries of a bitter loser who wanted to steal the election and other-throw the government.

However, people seem to forget that in 2016, when Trump won, the Democrats made the same claims about a stolen electionHillary Clinton (who had told Trump to run for office believing him to be an easier contender to beat), was so bemused and angry over her loss to Trump, that she made up a whole 4 year news cycle of lies and distortions that became the infamous and now debunked Russigate hoax.

The Democrats definitely cried foul, and their lackies in the MSM touted as gospel, with nightly bombshell reports from Rachel Maddow on MSNBC, about Russia collusion that all turned out to be false. If there was any real proof that Russia had an agent running as the US POTUS then I think there would have been more than a failed attempt at impeachment. 

No there was nothing to see there in 2016, when the FBI raided an office to find out that Clintons DNC interns used to destroy her old phones and Blackberry devices with hammers. Also, that she was running illegal private servers from her home basement, with unsecured messaging between her and other DNC apparatchiks, using her own personal email accounts. 

Although many were destroyed, others were leaked. Most famously the Podesta emails probably sent to WikiLeaks by DNC staffer Seth Rich, who died in a "botched robbery", in which nothing was stolen, and the MSM covered it up as a right wing conspiracy. They just added it to their Russia is to blame for Trump being elected delusion, and their incorrect conclusion that Trump had somehow robbed her of that 2016 election

The botched robbery maybe true, and maybe Russia hacked the DNC then passed the info along to WikiLeaks. Thousands of GB slowly trickling out of the servers without being noticed. Or maybe someone working there just downloaded them and passed them along on a USB drive. 

It would have been a lot simpler to do, and much easier to disguise, unless he was found out of course. Of course it is just conspiracy theorists who suggest that Seth Rich was just another name for the list of the unexplained and mysterious deaths that seem to follow the Clinton family around over the decades.

It seems though that whoever wins the election for the world to clap their hands at and marvel at the "greatest nation on earth" and their Democratic Process, that the fate of the world hangs in the balance whoever becomes the outward face, whether pretending to be someone they are not, or just beholden to foreign interests. 

Either compromised through blackmail at an Epstein or P Diddler party, or just beholden to AIPAC or other big money interests seemingly needed by most politicians to run for President or the Senate/Congress.

The Deep State obviously thinks Trump is a risk to the flow of money to Ukraine, and the filling of MIC coffers which has already seen multiple attempts on his life. Something already being memory holed by the left leaning media, which is enough to raise suspicion on it's own, whatever the failures, accidental or deliberate by those supposed to be protecting him. 

The MSM is also trying to spin it in case of a successful hit or even not, that Iranian hitmen are all about, and that they are behind the attempts on his life, despite the attempted assassins links to the intelligence services.

It does seem to be a bit of a coincidence with all the strife in the Middle East at the moment, with Israel trying to drag the US into it's regional war, that Iran is all over the papers about plots to kill Trump.  

However, Trump seems to believe in these claims that it's Iran trying to kill him not Deep State trained nutjobs, that the MIC are using as Patsies. I don't doubt he will go after Iran and back Israel up in their regional war, whether or not he helps close down the Ukrainian threat to global stability and real and potential nuclear conflict with Russia.

Putin only just changed their nuclear doctrine on September 25, 2024. This now means that Russia will view any assault on it supported by a nuclear power as a joint attack, justifying a nuclear response. 

It knows that it is US/UK/NATO troops not Ukrainians, that load in the secure satellite based targeting data needed for long range attacks into it's country, and it will declare war on those countries if attacked by Storm Shadows or ATACM missiles. 

This stopped the recent announcement of such a move by UK's PM Sir Kier Starmer and President Biden on a recent visit to Washington due suspected back channel threats by Russia that they were not bluffing, giving a list of targets they would strike if attacked in such a manner.

So whoever becomes the face of the next US government, we can be assured of more US aggression whether its is in Ukraine, or the Middle East. 

The MIC and Deep State are not going to let the people of the USA have a real voice at the ballot box.  

All that matters is the money those companies like Raytheon and BAe pump in to support Presidential candidates, and paying them back in the best way they know how; 

Constant war.

By Dark Politricks

© 2024 Dark Politricks

Friday, 1 March 2024

Free Speech Will Die With Julian Assange

Free Speech is Dead but will we allow ourselves to witness the USA murder Julian Assange?

By Dark Politricks

It has been obvious for years now that true free speech is dead in the Western supposedly "free world". However the case of Julian Assange is one that all the mainstream papers who published his work, and profited from it whilst Wikileaks itself did not, seem to have forgotten the importance of his case for all journalists, legacy and alternative. 

Julian Assange before he was tortured by the UK

Julian has been slowly tortured through years of solitary confinement in Belmarsh prison and before that within the Ecuadorian embassy, where the CIA and MI6 plotted to kill him lest anyone forget. 

If he is sent to the USA who want to lock him up for over 175 years, he will surely die. If he is locked up in a supermax prison he will probably be Epstein'd off, shanked in the showers by a CIA paid prisoner with nothing to lose, commit suicide, or even be executed. 

His trial under the ancient Espionage Act means he has no right to claim the public had a right to see the war crimes committed by the USA they claim he and Chelsea Manning hacked US computers to obtain. He is being charged using a fraudulent FBI case that relied on a compromised witness who lied in his testimony about Assange doing any sort of actual hacking which the US still claims he did. Quote:
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder. The witness, who has a documented history with sociopathy and has received several convictions for sexual abuse of minors and wide-ranging financial fraud, made the admission in a newly published interview in Stundin where he also confessed to having continued his crime spree whilst working with the Department of Justice and FBI and receiving a promise of immunity from prosecution.
You can read my full article here about the fraudulent witness the FBI relied on to make their case about Assange actually hacking US computers to get the information with Chelsea Manning.

To see all my previous articles I have created here, or imported since I got removed from my older bigger site, you can use my new search bar to search for "Julian Assange"

If you want to see all the articles I had on my old site you will need to use the Wayback Machine, It is quite a trip down memory lane to see all the articles I had back then, for if any long time reader remembers, it was Wikileaks release of the snuff video of the US helicopter murder of Reuters reporters on the ground in Iraq that started the rage in me that got me first writing Dark Politricks. 

However that article is not available here or even on the Wayback machine it seems, not that I can find anyway, it seems the authorities have even tried cleaning my old site on the never go away Internet site itself. An unusually large no of articles related to Assange and Manning are 404 Not Found - or claimed to have never been indexed at all. Very suspicious. 

However you can see watch that infamous video with commentary from Assange below.


Remember if you ever find videos on here, maybe from RT.com, or others just blocked with a "This video is not available in your country", to use a VPN to get around the block. It is good to see the Brave browser search bar is not blocking Russia Today anymore, whilst other search engines still hide the site. I have found using Belarus the best country to get RT content which was banned at the start of the Russian Special Military Operation in Ukraine. If you cannot afford to pay for a VPN, Bitdefender allows you up to 200MB of free traffic over their servers per day. Another choice is Proton VPN, which offers some free server locations around the world.

"The United States must pledge before the world that it will not pursue journalists for shining a light on the secret crimes of the powerful."
"There must be no more foolish talk about prosecuting any media organization, be it WikiLeaks or be it the New York Times."
The New York Times, once a bastion of free speech who often printed Wikileaks material as well as information from the Snowden files, is now nothing more than an establishment paper pushing CIA intelligence. Is not making any comments about the possibility of Julian Assange being extradited to the USA from the UK despite publishing the same material Wikileaks published.

It does not matter if you are a paid journalist working for one of these big papers or a blogger like me exposing more information that the mainstream media won't go near, such as pro Palestinian news, and the news you don't hear from the Russian Ukrainian war

If we let the murder of Julian Assange go ahead it will shake fear into many journalists bellies making them self censor what they write, scared of the same possible treatment.

We cannot let the murder of Julian Assange by the combined intelligence services of the UK and USA go ahead. 

Free speech may have died in the UK long ago, and in the USA no-one is sticking up for their constitutional rights, letting the Government expand the massive US Security state, step by step, making the Constitution irrelevant. If you don't protect it, the Government and the permanent security state will take it away, and that's what is happening in America right now. 

If you are American and believe in your Constitution then you should be protesting the extradition of Julian Assange as well all these new extensions to the FISA court and expansion of NSA surveillance on US citizens. 

The death of Julian Assange will just be the final nail in the coffin.


I hope the UK judges have not had closed ears since the last appeal where the FBI's lies about Julian Assange were used to let his case proceed forward. One of the judges is an existing attorney that helps the UK security services and really should have been recused, but she has stayed sitting.

It is not a good sign when the Judges deciding your fate probably hate you and your website for allowing intelligence to be aired, that whilst in the public interest, was not in the interest of the Security State they themselves work for.

Lets pray for a Tory Home Secretary to have the balls Teressa May did when preventing the extradition of Gary McKinnon to the USA over his UFO hacking due to health issues.

By Dark Politricks

© 2024 Dark Politricks

Monday, 27 September 2021

The UK Is Becoming More Despotic Every Day

CIA Wanted To Assassinate Julian Assange Whilst In the Ecuadorian Embassy

By Dark Politricks


Hopefully by now you have read about the CIA's plans to assassinate Julian Assange in a shoot out at the Ecuadorian Embassy when he was holed up there in his 5th year.

An investigation revealed the CIA planned to abduct, kidnap, or assassinate WikiLeaks founder Julian Assange and senior officials inside the CIA asked for "sketches" or "options" to be drawn up as to how these acts could be carried out on Assange.





A Yahoo News investigation has discovered that the Central Intelligence Agency (CIA) had plans to kidnap and assassinate Julian Assange while he was held up in the Ecuadorian Embassy in early 2017. It was his fifth straight year there as Wikileaks continued to reveal crimes against humanity by several governments and, or often in collusion with, big powerful multinational corporations.

Some National Security Council officials worried that the CIA’s proposals to kidnap Assange would not only be illegal but also might jeopardize the prosecution of the WikiLeaks founder. Concerned the CIA’s plans would derail a potential criminal case, the Justice Department expedited the drafting of charges against Assange to ensure that they were in place if he were brought to the United States.

In late 2017, in the midst of the debate over kidnapping and other extreme measures, the agency’s plans were upended when U.S. officials picked up what they viewed as alarming reports that Russian intelligence operatives were preparing to sneak Assange out of the United Kingdom and spirit him away to Moscow.

The intelligence reporting about a possible breakout was viewed as credible at the highest levels of the U.S. government. At the time, Ecuadorian officials had begun efforts to grant Assange diplomatic status as part of a scheme to give him cover to leave the embassy and fly to Moscow to serve in the country’s Russian mission.

In response, the CIA and the White House began preparing for a number of scenarios to foil Assange’s Russian departure plans, according to three former officials. 

Those included potential gun battles with Kremlin operatives on the streets of London, crashing a car into a Russian diplomatic vehicle transporting Assange and then grabbing him, and shooting out the tires of a Russian plane carrying Assange before it could take off for Moscow. 

You can watch this news expose on the Yahoo investigation here, or on YouTube at The Hill.



The most important part I want you to note is that, U.S. officials asked their British counterparts to do the shooting if gunfire was required, and the British agreed, according to a former senior administration official. 

This means the British Tory Government was prepared to break international law, and almost cause a potential war with Russia by acting for the Americans in shooting at Russian Diplomatic vehicles and planes

Who can wonder what would have happened if this had occurred but it worries me greatly that the UK is now so despotic that it would even consider helping the USA in such a plan.

We no longer have most of our civil liberties due to the COVID law that was meant to stay on the books for just 2 years. Boris has already extended them until September and hasn't ruled out extending them again.  Lest I remind you I warned you of this 2 years ago when they were implemented and recently again, they are the greatest loss of civil rights and liberty since WWII.

The new Police Bill the Tories are passing will ban protests that the police deem "too loud". Protests are naturally loud. Without them many people would not even know was going on in this country, despite the MSM labelling protesters as anti-vaxers when they are in fact against 2 tier society based on vaccine passports and mandated vaccination which have now proved to be almost useless due to the anti-bodies not lasting long enough, or protecting against variants of the virus. 

You only need to look at Israel one of the highest vaccinated countries on earth who just recorded their highest no of COVID infections since the peak of their 3rd wave to see how the vaccines are not working. They are now mandating 3 shots and then probably 4 and then monthly all due to the anti-bodies not lasting long enough compared to natural immunity. 

We should be working on vaccines properly such as those that cured Polio, and we have as children for Mumps that keep the anti-bodies longer throughout our lifetime however this takes time and Big Pharma cannot wait to make more money. 

What's more important to them, make billions more now by getting countries to buy more products and mandate more shots or spend money and time working on a proper vaccine cure with long term trials and testing for this virus.

The Tories plan to make it illegal for journalists, bloggers, anyone to report on illegal activity carried out by the British State, I guess this would include the Yahoo news investigation on the plans to have a shoot out with Russian agents on the streets of London all to help an ally assassinate a journalist who has never been proved wrong once and is being tortured slowly in a High Max prison at Belmarsh when he should be on bail.

This country is turning into something I really do not like the look of. If you are planning on having children I would seriously look around and take a look at what our country is becoming. Not only do we protect al-Qaeda and ISIS in Syria from being exterminated by Russian and Syrian forces but we plot and plan constantly against Russia whilst accusing them of doing the same sort of activities that we are doing ourselves. 

We are looking more and more like China every day, and soon as possible we will be implementing Chinese style Social Credit systems on the populace to keep us in check.

Soon there will be no skilled manual jobs as AI and Robotics take over from human labour. Automatic driving vehicles and drones to deliver packages and fast food. There will be less need for people to work skilled jobs and the jobs that you used to need a degree for will all be home based solitary activities where you communicate with workers by ZOOM and have little social interaction. 

This is part of the Governments aim to reduce CO2 emissions by preventing people from driving to and from work. 

Do you really want to spend your life working in solitude with no social interaction?

It's what made me leave my last job as it was just so unfulfilling but bosses will save money from renting office space and care little about employees mental health when they can make more money for themselves.

Soon towns will become desolate areas with one big Amazon depot in the middle, auto driving lorries delivering and transporting goods, drones flying in and out and the only jobs will be gig work for people who get sacked by text message when they can't deliver food for people in time due to petrol shortages at garages caused by the lack of foresight from our government.

I just think our country is going down hill and this latest story about willing to almost start WWIII over killing a journalist is just too much for me to stand.

Please leave your comments about the state of the UK below. I would be interested to know what you think about it.



By Dark Politricks

© 2021 Dark Politricks

Saturday, 3 July 2021

Key witness in Julian Assange case was lying as an FBI informant to get off charges of sexual crime against kids

How the US handles legal issues, it lies, and tortures it's targets, and uses fraudulent witnesses to boost their case.


By Dark Politricks

Get the full article here on stundin.is



A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder. The witness, who has a documented history with sociopathy and has received several convictions for sexual abuse of minors and wide-ranging financial fraud, made the admission in a newly published interview in Stundin where he also confessed to having continued his crime spree whilst working with the Department of Justiceand FBI and receiving a promise of immunity from prosecution.

The man in question, Sigurdur Ingi Thordarson, was recruited by US authorities to build a case against Assange after misleading them to believe he was previously a close associate of his. In fact he had volunteered on a limited basis to raise money for Wikileaks in 2010 but was found to have used that opportunity to embezzle more than $50,000 from the organization. Julian Assange was visiting Thordarson’s home country of Iceland around this time due to his work with Icelandic media and members of parliament in preparing the Icelandic Modern Media Initiative, a press freedom project that produced a parliamentary resolution supporting whistleblowers and investigative journalism. 

The United States is currently seeking Assange’s extradition from the United Kingdom in order to try him for espionage relating to the release of leaked classified documents. If convicted, he could face up to 175 years in prison. The indictment has sparked fears for press freedoms in the United States and beyond and prompted strong statements in support of Assange from Amnesty International, Reporters without borders, the editorial staff of the Washington Post and many others. 

US officials presented an updated version of an indictment against him to a Magistrate court in London last summer. The veracity of the information contained therein is now directly contradicted by the main witness, whose testimony it is based on.

No instruction from Assange

The court documents refer to Mr Thordarson simply as “Teenager” (a reference to his youthful appearance rather than true age, he is 28 years old) and Iceland as “NATO Country 1” but make no real effort to hide the identity of either. They purport to show that Assange instructed Thordarson to commit computer intrusions or hacking in Iceland. 

The aim of this addition to the indictment was apparently to shore up and support the conspiracy charge against Assange in relation to his interactions with Chelsea Manning. Those occurred around the same time he resided in Iceland and the authors of the indictment felt they could strengthen their case by alleging he was involved in illegal activity there as well. This activity was said to include attempts to hack into the computers of members of parliament and record their conversations.

In fact, Thordarson now admits to Stundin that Assange never asked him to hack or access phone recordings of MPs. His new claim is that he had in fact received some files from a third party who claimed to have recorded MPs and had offered to share them with Assange without having any idea what they actually contained. He claims he never checked the contents of the files or even if they contained audio recordings as his third party source suggested. He further admits the claim, that Assange had instructed or asked him to access computers in order to find any such recordings, is false.

Nonetheless, the tactics employed by US officials appear to have been successful as can be gleaned from the ruling of Magistrate Court Judge Vanessa Baraitser on January 4th of this year. Although she ruled against extradition, she did so purely on humanitarian grounds relating to Assange’s health concerns, suicide risk and the conditions he would face in confinement in US prisons. With regards to the actual accusations made in the indictment Baraitser sided with the arguments of the American legal team, including citing the specific samples from Iceland which are now seriously called into question.

Other misleading elements can be found in the indictment, and later reflected in the Magistrate’s judgement, based on Thordarson’s now admitted lies. One is a reference to Icelandic bank documents. The Magistrate court judgement reads: “It is alleged that Mr. Assange and Teenager failed a joint attempt to decrypt a file stolen from a “NATO country 1” bank”.


Thordarson admits to Stundin that this actually refers to a well publicised event in which an encrypted file was leaked from an Icelandic bank and assumed to contain information about defaulted loans provided by the Icelandic Landsbanki. The bank went under in the fall of 2008, along with almost all other financial institutions in Iceland, and plunged the country into a severe economic crisis. The file was at this time, in summer of 2010, shared by many online who attempted to decrypt it for the public interest purpose of revealing what precipitated the financial crisis. Nothing supports the claim that this file was even “stolen” per se, as it was assumed to have been distributed by whistle-blowers from inside the failed bank.

More deceptive language emerges in the aforementioned judgment where it states: “...he [Assange] used the unauthorized access given to him by a source, to access a government website of NATO country-1 used to track police vehicles.”

This depiction leaves out an important element, one that Thordarson clarifies in his interview with Stundin. The login information was in fact his own and not obtained through any nefarious means. In fact, he now admits he had been given this access as a matter of routine due to his work as a first responder while volunteering for a search and rescue team. He also says Assange never asked for any such access.

Revealing chat logs

Thordarson spoke with a journalist from Stundin for several hours as he prepared a thorough investigative report into his activities that include never before published chat logs and new documents.

The chat logs were gathered by Thordarson himself and give a comprehensive picture of his communications whilst he was volunteering for Wikileaks in 2010 and 11. It entails his talks with WikiLeaks staff as well as unauthorized communications with members of international hacking groups that he got into contact with via his role as a moderator on an open IRC WikiLeaks forum, which is a form of live online chat. There is no indication WikiLeaks staff had any knowledge of Thordarson’s contacts with aforementioned hacking groups, indeed the logs show his clear deception. 

The communications there show a pattern where Thordarson is constantly inflating his position within WikiLeaks, describing himself as chief of staff, head of communications, No 2 in the organization or responsible for recruits. In these communications Thordarson frequently asks the hackers to either access material from Icelandic entities or attack Icelandic websites with so-called DDoS attacks. These are designed to disable sites and make them inaccessible but not cause permanent damage to content.

Stundin cannot find any evidence that Thordarson was ever instructed to make those requests by anyone inside WikiLeaks. Thordarson himself is not even claiming that, although he explains this as something Assange was aware of or that he had interpreted it so that this was expected of him. How this supposed non-verbal communication took place he cannot explain.

Furthermore, he never explained why WikiLeaks would be interested in attacking any interests in Iceland, especially at such a sensitive time while they were in the midst of publishing a huge trove of US diplomatic cables as part of an international media partnership. Assange is not known to have had any grievances with Icelandic authorities and was in fact working with members of parliament in updating Iceland’s freedom of press laws for the 21st century. 

On the FBI radar

Thordarson's rogue acts were not limited to communications of that nature as he also admits to Stundin that he set up avenues of communication with journalists and had media pay for lavish trips abroad where he misrepresented himself as an official representative of WikiLeaks.

He also admits that he stole documents from WikiLeaks staff by copying their hard drives. Among those were documents from Renata Avila, a lawyer who worked for the organization and Mr. Assange.

Thordarson continued to step up his illicit activities in the summer of 2011 when he established communication with “Sabu”, the online moniker of Hector Xavier Monsegur, a hacker and a member of the rather infamous LulzSec hacker group

In that effort all indications are that Thordarson was acting alone without any authorization, let alone urging, from anyone inside WikiLeaks.

Read the rest of the article at stundin.is.


By Dark Politricks

© 2021 Dark Politricks

Monday, 29 June 2020

How Many People Do You Know That Have Died In Mysterious Circumstances?

Bill and Hillary Clinton Are Mysteriously Linked To Over 60+ Deaths

By Dark Politricks

How many people in your life have mysteriously turned up dead in often bizarre circumstances?

Probably none if you are a regular sort of person but if you are a powerful person like Bill and Hillary Clinton it seems that people just carry on dropping dead all over the place, the most recent being Seth Rich and notorious pimp and procurer of under age girls Jeffery Epstein

He was found dead in a cell after complaining that people were going to kill him, with ligature marks that suggest someone strangled him, dozens of prison jumpsuits lying all over the cell, a missing cell mate, guards who fell asleep during his death and mysterious CCTV outage that prevented anyone seeing what happened. 

Sounds suspicious right? Nope, ruled a suicide already and no further questions asked. He was linked to not only Bill Clinton and Donald Trump but the British Royal Family through Prince Andrew who had been photographed with an under-age girl who has accused him of rape. Not that he will be interviewed by the FBI of course, the Royals don't partake in events the commoners must, such as criminal law investigations.

Just like the CIA who had one of their agents, Anne Sacoolas forget she had to drive on the left side of the road in the UK. She knocked down and killed a 19 year old British boy, Harry Dunn, before getting on a plane and flying home. She refuses to come back. The CIA like the Royals don't do criminal investigations. Maybe we could offer a trade, Prince Andrew for Anne, I doubt anyone in the UK would miss the Prince.

So who is on this list of people that many sites on the "blacklist" have reported on. I am just repeating what many other great sites have done in the case one or two of them pops down that Google drain-hole I have been warning about.

Don't worry though - bookmark this site, and use the search bar at the top. It will only return results from the most wanted, the most deadly and dangerous sites out there. The sites, a supposed US professor compiled and declared they are too dangerous for you to make your own mind up. So dare to read them at your own risk!

  1. James McDougal. Clinton’s convicted Whitewater partner died of an apparent heart attack, while in solitary confinement. He was a key witness in Ken Starr’s investigation.
  2. Mary Mahoney. A former White House intern was murdered July 1997 at a Starbucks Coffee Shop in Georgetown. The murder happened just after she was to go public with her story of sexual harassment in the White House.
  3. Vince Foster. Former White House counselor, and colleague of Hillary Clinton at Little Rock’s Rose Law firm. Died of a gunshot wound to the head, ruled a suicide.
  4. Ron Brown. Secretary of Commerce and former DNC Chairman. Reported to have died by impact in a plane crash. A pathologist close to the investigation reported that there was a hole in the top of Brown’s skull resembling a gunshot wound. At the time of his death, Brown was being investigated, and spoke publicly of his willingness to cut a deal with prosecutors.
  5. C. Victor Raiser II and Montgomery Raiser, major players in the Clinton fund raising organization, died in a private plane crash in July 1992.
  6. Paul Tulley. DCN Political Director found dead in a hotel room in Little Rock, September 1992. Described by Clinton as a “dear friend and trusted advisor.”
  7. Ed Willey. Clinton fundraiser, found dead November 1993 deep in the woods in VA of a gunshot wound to the head. Ruled a suicide. Ed Willey died on the same day his wife Kathleen Willey claimed Bill Clinton groped her in the oval office in the White House. Ed Willey was involved in several Clinton fundraising events.
  8. Jerry Parks. Head of Clinton’s gubernatorial security team in Little Rock. Gunned down in his car at a deserted intersection outside Little Rock. Park’s son said his father was building a dossier on Clinton. He allegedly threatened to reveal this information. After he died, the files were mysteriously removed from his house.
  9. James Bunch. Died from a gunshot suicide. It was reported that he had a “Black Book” of people which contained names of influential people who visited prostitutes in Texas and Arkansas.
  10. James Wilson. Was found dead in May 1993 from an apparent suicide by hanging. He was reported to have ties to Whitewater.
  11. Kathy Ferguson. Ex-wife of Arkansas Trooper Danny Ferguson was found dead in May 1994, in her living room, with a gunshot to her head. It was ruled a suicide even though there were several packed suitcases, as if she were going somewhere. Danny Ferguson was a co-defendant along with Bill Clinton in the Paula Jones lawsuit. Kathy Ferguson was a possible corroborating witness for Paula Jones.
  12. Bill Shelton. Arkansas State Trooper and fiancée of Kathy Ferguson. Critical of the suicide ruling of his fiancée, he was found dead in June 1994 of a gunshot wound, also ruled a suicide at the grave site of his fiancée.
  13. Gandy Baugh. Attorney for Clinton’s friend Dan Lassater, died by jumping out a window of a tall building January 1994. His client was a convicted drug distributor.
  14. Florence Martin. Accountant and subcontractor for the CIA, was related to the Barry Seal Mena Airport drug smuggling case. He died of three gunshot wounds.
  15. Suzanne Coleman. Reportedly had an affair with Clinton when he was Arkansas Attorney General. Died of a gunshot wound to the back of the head, ruled a suicide. Was pregnant at the time of her death.
  16. Paul Grober. Clinton’s speech interpreter for the deaf from 1978 until her own death December 9, 1992. She died in a one-car accident.
  17. Danny Casolaro. Investigative reporter. While in the middle of his investigation into Mena Airport and Arkansas Development Finance Authority, he slit his wrists, apparently.
  18. Paul Wilcher. Attorney investigating corruption at Mena Airport with Casolaro and the 1980 “October Surprise” was found dead on a toilet June 22, 1993 in his Washington, DC apartment. Had delivered a report to Janet Reno three weeks before his death.
  19. Jon Parnell Walker. Whitewater investigator for Resolution Trust Corporation. Jumped to his death from his Arlington, Virginia apartment balcony August 15, 1993. He was investigating the Morgan Guarantee scandal.
  20. Barbara Wise. Commerce staffer. Worked closely with Ron Brown and John Huang. Cause of death unknown. Died November 29, 1996. Her bruised, nude body was found locked in her office at the Department of Commerce.
  21. Charles Meissner. Assistant Secretary of Commerce who gave John Huang special security clearance, died shortly thereafter in a small plane crash.
  22. Dr. Stanley Heard. Chairman of the National Chiropractic Health Care Advisory Committee, died with his attorney Steve Dickson in a small plane crash. Dr. Heard, in addition to serving on Clinton’s advisory council, personally treated Clinton’s mother, stepfather and brother.
  23. Barry Seal. Drug running pilot out of Mena, Arkansas. Death was no accident.
  24. Johnny Lawhorn Jr. Mechanic who found a check made out to Bill Clinton in the trunk of a car left at his repair shop. He was found dead after his car had hit a utility pole.
  25. Stanley Huggins. Investigated Madison Guarantee. His death was a purported suicide and his report was never released.
  26. Hershell Friday. Attorney and Clinton fund raiser died March 1, 1994, when his plane exploded.
  27. Kevin Ives and Don Henry – known as “the boys on the track” case. Reports say the boys may have stumbled upon the Mena Arkansas airport drug operation. A controversial case, the initial report of death said, due to falling asleep on railroad tracks. Later reports claim the two boys had been slain before being placed on the tracks. Many linked to the case died before their testimony could come before a Grand Jury.
THE FOLLOWING PERSONS HAD INFORMATION ON THE IVES/HENRY CASE:
  1. Keith Coney. Died when his motorcycle slammed into the back of a truck in July 1988.
  2. Keith McMaskle. Died stabbed 113 times November 1988l.
  3. Gregory Collins. Died from a gunshot wound January 1989.
  4. Jeff Rhodes. He was shot, mutilated and found burned in a trash dump in April 1989.
  5. James Milan. Found decapitated. However, the Coroner ruled his death was due to “natural causes.”
  6. Jordan Kettleson. Was found shot to death in the front seat of his pickup truck in June 1990.
  7. Richard Winters. A suspect in the Ives/Henry deaths, he was killed in a set-up robbery July 1989.
THE FOLLOWING CLINTON BODYGUARDS ARE DEAD:
  1. Major William S. Barkley, Jr. (37)
  2. Captain Scott J. Reynolds (38)
  3. Sgt. Brian Haney (39)
  4. Sgt Tim Sabel (40)
  5. Major General William Robertson (41)
  6. Col. William Densberger (42)
  7. Col. Robert Kelly (43)
  8. Spec. Gary Rhodes (44)
  9. Steve Willis (45) – ATF agent killed at Waco, TX 02/28/93
  10. Robert Williams (46) – ATF agent killed at Waco, TX 02/28/93
  11. Conway LeBleu (47) – ATF agent killed at Waco, TX 02/28/93
  12. Todd McKeehan
  13. World-renowned “space economist” Molly Macauly was brutally murdered in Baltimore Park.
  14. John Ashe. The former President of the UN General Assembly was awaiting trial on bribery charges when he turned up dead in June, apparently having crushed his own windpipe while lifting weights in his home.
  15. Victor Thorn. Prominent Clinton critic found dead of apparent suicide on his birthday.
  16. Seth Rich. Still no clues in the murder of DNC’s Seth Rich, as conspiracy theories thicken.
  17. Joe Montano. Filipino American activist and aide to Sen. Kaine, dies at 47.
  18. Shawn Lucas. Death of DNC Lawsuit Processor adds to Seth Rich conspiracy theories.
  19. Seth Rich. Family’s private investigator. There is evidence Seth Rich had contact with WikiLeaks prior to his death.
  20. Klaus Eberwein. Found dead before testifying against the Clinton Foundation in the Haiti cover-up.
  21. Unnamed man who sought Clinton’s emails from Russian hackers committed suicide.
  22. John F. Kennedy, Jr. Planned to run against Hillary for the NY US Senate seat.
  23. Klaus Eberwein. The former Haitian official had reportedly expressed concern to his peers about retaliation, and fearing for his life, over speaking out about the Clintons.
  24. Peter W. Smith. Found dead in his hotel room after allegedly suffocating himself with a plastic bag and helium. His death came 10 days before the publication of a story he had given to the Wall Street Journal regarding Russian hackers and Hillary Clinton’s 33,00 missing emails – which he had been seeking.
  25. Monica Petersen. Killed after she discovered that the Clinton Foundation was involved in a child sex trafficking ring in Haiti.
  26. Pending? Larry Nichols. Responsible for bringing forth more evidence and witnesses on Clinton corruption than any other source. Very public about his claims against Clinton. He has suffered six beatings, arrested on trumped-up charges, and has received numerous death threats.
  27. Gary Johnson. Former attorney for Larry Nichols, severely beaten and left for dead.
  28. Jeffery Epstein, Bill Clinton, who looks more and more like an AIDS victim every day was a frequent flyer on Epstein's Lolita Express airlines, and records show he took at least 26 flights, some without his secret service detail, to his private Island. This was a place where under-age girls were on offer and many famous people refused to say no. Epstein was found in his cell supposedly after committing suicide but his ligature marks showed marks that suggested he was strangled not hung, his cell mate mysteriously disappeared, the guards both fell asleep and the CCTV had a blip and was off during the event. Smells of a hit job don't you think, well not to the authorities. Epstein was going to testify in court and had a big black book that could have ruined not only Bill Clinton but many rich and powerful people including Prince Andrew and Donald Trump who noted that Jeffery "likes them young, the younger the better".
  29. Pending? Donna Brazile. The former interim DNC chair accused Clinton of “rigging” the nomination against Bernie Sanders. She also claims that Hillary secretly took over the DNC through an “unethical” fundraising agreement before she won the 2016 primary.

By Dark Politricks

© 2020 Dark Politricks

Wednesday, 12 April 2017

CIA's Vault 7 Hacking Squad

CIA's Vault 7 Hacking Squad


By Dark Politricks

Vault 7: WikiLeaks reveals CIA's own internal hacking squad

I cannot remember when it was I wrote the article but you can check out some of the ways the authorities are listening to you on this older article I wrote some time ago.

I even warned about WebCams on TVs and phones listening and filming you.

In fact I have warned about that for a long time now. When TRAPWIRE is recording you from every CCTV, NSA is listening in on every phone call and text you send, the CIA is now watching you jerk off to Judge Judy through your TV.

It may sound ridiculous but can you imagine a room full of men, yes even very professional men, who when they get a nice shot of hot babe doing something in front of her TV, do you honestly believe they are not going to get their colleagues to come and have a gander and all have a good laugh?

It is just office mentality full of fools with dangerous tools.

I have a list of things you can try to do to mitigate the issue of living in a global Police State where once again it seems England and GCHQ, got on their knees in front of the CIA, and gobbled up all the work not covered by laws that protect UK citizens - are there even any left?

The article comes from WikiLeaks site if you want to read it there.

 WikiLeaks.org

A few days ago WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation.

This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponised" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs.

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".

Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.

CIA 'hoarded' vulnerabilities ("zero days")

In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

'Cyberwar' programs are a serious proliferation risk

Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.

Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'.

Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"

Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.

To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time. CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".

CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionnaires.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software.

The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now? WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.

Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.

Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.

Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions. The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?#

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is "Vault 7"

"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of "Vault 7" obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of "Vault 7" from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of "Vault 7"?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of "Vault 7"?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already 'mined' all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won't other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Read the full article and support WikiLeaks here WikiLeaks.org.

How to Protect Yourself

The ways to protect yourself from unwanted spying and trojans in your phone and PC are getting smaller and smaller. Even phone apps for virus checkers are actually spyware pretending to be virus checkers.

I have a list of many of the ways you can be spied upon by hackers or the CIA on this page but you can be in no doubt their technological skills are far greater than ours.

I think the only way is to go backwards to use tools that cannot be hacked.


  • Buy a TV without a webcam or even not a smart TV then buy a Roku to make it smart with catch up channels and Netflix.
  • Train pigeons like Pablo Escobar did in his prison to send messages to other people or actually talk face to face on a bench in a park with no phones on you.
  • You could put masking tape over your web cam when you are not using it and reattach when you want to Skype someone.
  • You could get an old Nokia and take the whole battery and even SIM out so that no GPS tracking can be done and with the battery removed they cannot even triangulate your whereabouts.
  • If you are going somewhere where you don't want anyone to know can you take your battery and SIM card out, if you can, and most smart phones make it very hard to, then do so.
  • Buy a 2nd "dumb phone" meant for OAP's, the battery is easily removable and they don't come with all the Logging Apps, Fake Games and GPS tracking jazz of smart phone. I would guess at least 20% of the games on Facebook that people constantly annoy you with are actually viruses or secret open door apps that send traffic using your own credit to wherever it needed to go.
  • Leave your phone at home if you don't need it.
  • Your TV is turned off and you are about to make love to your girl on the sofa. What you don't know is the TV is in "Fake Off" mode, where the geeks at GCHQ who have trouble meeting women as they were hired for their autistic skills, re-attach the tape and detach any external speakers. Try and stop a crowd getting a PornoTube video at work.
  • Don't use Wickr, WhatsApp or Telegram, who tell you they are encrypted end to end to talk important info. The CIA will have an unencrypted version of the message before you sent it.

Learn to live without technology. Get into the mindset of someone in the 90's where we all knew everyone's phone number in our heads and it was only 10p to use a phone box - not that I see many boxes anymore. No-one carried phones and spend all day and night on them. The worse you could expect was some crackling and beeps on a hacked into house phone.

People we are entering a global world where rich banksters and corrupt politicians bend over to the international corporations and allow them to do what they want. Be careful.

Read the original article at darkpolitricks.com and please help us out by visiting our advertisers.

By Dark Politricks 


© 2017 Dark Politricks